Security devices are vulnerable to Differential Power Analysis (DPA) that reveals the key by monitoring the power consumption of the circuits. In this paper, we present the first DPA attack against an FPGA implementation of the Camellia encryption algorithm with all key sizes and evaluate the DPA resistance of the algorithm. The Camellia cryptographic algorithm involves several different key-dependent intermediate operations including S-Box operations. In previous research, it was believed that the Camellia is stronger than AES due to the additional Whitening phase protecting the S-Box operation. However, we propose an attack that bypasses the Whitening phase and targets the S-Box. In this paper, we also discuss a lowcost countermeasure strategy to protect the Pre-whitening / Post-whitening and FL function of Camellia using Dual-rail Precharged Logic and to protect against attacks of the S-Box using Random Delay Insertion.
|Title of host publication||Proceedings of the 2009 International Conference on Field-Programmable Technology, FPT'09|
|Number of pages||7|
|Publication status||Published - 01 Jan 2009|
ASJC Scopus subject areas
- Computational Theory and Mathematics
- Hardware and Architecture
Lu, Y., O'Neill, M. P., & McCanny, J. V. (2009). Differential power analysis resistance of Camellia and countermeasure strategy on FPGAs. In Proceedings of the 2009 International Conference on Field-Programmable Technology, FPT'09 (pp. 183-189) https://doi.org/10.1109/FPT.2009.5377650